Introduction to Security Malware
Ming Chow (mchow@cs.tufts.edu) Twitter: @0xmchow
Introduction to Security Malware Ming Chow (mchow@cs.tufts.edu) - - PowerPoint PPT Presentation
Introduction to Security Malware Ming Chow (mchow@cs.tufts.edu) Twitter: @0xmchow Learning Objectives By the end of this week, you will be able to: Describe types of malware See certain malware behaviors Scan and analyze malware
Ming Chow (mchow@cs.tufts.edu) Twitter: @0xmchow
static and dynamic analysis, and password cracking which are important in some malware
Service attacks
and botnet
applications to run in administrator by default (a.k.a.,root mode)
assigned to you. Therefore, less likely to wreck havok
infect the person's system as well
propagation)
network (e.g., consuming bandwidth)
remote commands such as rsh, password cracking, using socket
etc.) to copy itself to that second computer
ARPANET
sendmail program would then try to execute the named Þle, the code for execution being the contents of the message
machines from their '.rhosts' files
https://technet.microsoft.com/library/security/ms01-033
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
2000 Servers
find a database
things
Mpack)
connects a remote Command Prompt.
<IP address of Windows target machine> 7777
website)
https://www.virustotal.com/en/file/9654bb748199882b0fb29b1fa597c0cfe 3b9d610adf4188a0b440f3faf5ee527/analysis/1325191864/
administrative access) to the operating system (thus called rootkit) while hiding its presence by subverting normal OS behavior. A rootkit typically has three goals:
systems (including Windows) have mechanisms such as Access Control Lists (ACLs) in place to prevent an application from getting access to protected resources. Rootkits take advantage of vulnerabilities in these mechanisms or use social engineering attacks to get installed so that they have no restrictions on what they are able to do.
and remove it. The best way to prevent this is to appear invisible to all other applications running
being hidden are all well and good, but a rootkit author wants to get something from the compromised computer, such as stealing passwords or network bandwidth, or installing other malicious software.”
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepa pers/rootkits.pdf
Windows PowerShell from Microsoft but a malicious version of
https://www.bleepingcomputer.com/startups/rootkits/
https://technet.microsoft.com/en-us/sysinternals/rootkitrevealer.aspx
with Bitcoins)
a wide variety of purposes such as file sharing, printer sharing, and access to remote Windows
SMB vulnerability named “EternalBlue” (from trove of leaked NSA exploits) which was part of the Microsoft security bulletin MS17-010: https://technet.microsoft.com/en-us/library/security/ms17- 010.aspx
and propagate to other machines in a network. The attack uses SMB version 1 and TCP port 445 to propagate.
wannacry-use-of-eternalblue.html
patterns known as signatures
(decryption and key are somewhere else)
signatures from the anti-virus software vendors by altering the DNS software on the infected machine
quick detection of viruses, worms, trojans, and all kinds of malware.
sample-sources/
system to "normal"?